A Strengths-Based Approach to
Safety Planning for Domestic
Sherry Hamby, Ph.D.
Life Paths Research Program,
University of the South
Presented at the Connect Centre for International
Research on New Approaches to Prevent Violence
& Harm, University of Central Lancashire
November 6, 2013
Topics We Will Cover Today
• The limitations of the deficit-focused paradigm
and an alternative strengths-based framework.
• How understanding the full spectrum of risks is
important to recognizing the full spectrums of
• Battered women’s protective strategies
• A new approach to risk assessment and safety
Insights of the Akwesasne Mohawks
From Arquette et al., 2002
No toxin exposure, no adverse health
• What about….
– Loss of traditional hunting & fishing practices, loss
of traditional medicines
– Alternative diets that are high in fat and calories
and low in vitamins and nutrients, leading to
High blood pressure
Obesity (Arquette et al., 2002)
Any Escape from Deficit Models?
• Deficit models imply that women who
remain in violent relationships have failed
• Is it right to call victimized women
“compliant zombies,” “intentional game
players” or people with “masochistic self
states”? Well, it is in published
• Theoretical models focus on cognitive
distortions and behavioral deficits:
– Battered Woman’s Syndrome (Walker, 1984)
– Traumatic bonding (Dutton, 1995; Graham et
– Transtheoretical model of behavior change
(Lerner & Kennedy, many more).
In an ideal world, no one would sustain violence, especially by an intimate
partner. Reality much more grim for many women.
The dangers of staying with a violent partner may be less than the dangers
of living on the streets.
The pain of an occasional beating may be less than the pain of losing
custody of one’s children to a violent man.
Assuming that leaving is always better has led to unhelpful interventions
and has contributed to victim blaming.
Unfortunately, in many studies on coping, leaving and steps directly tied
to leaving are the only positive coping strategies measured.
• As Laura Brown (2010) has
stated, “What is inherent in
feminist therapy is the radical
notion that silenced voices of
marginalized people are
considered to be the sources of
• Looking down on your clients as
passive or “compromised” is not a
What Are Pros & Cons of
Assessment & Safety Planning?
Pros of Current Strategies
• Comprehensive lists of risks of
perpetrator danger (recommend
Assessment for this).
• Many safety planning suggestions
accumulated from advocates’
experiences (National Domestic
Violence Hotline website is
• Easy to use
Cons: An Overly Narrow Definition of
Risk --Ask Only About Factors Related to Physical
• The most frequent topics covered by popular
dangerousness/lethality assessment tools are (Laing,
2004; Websdale, 2000) :
batterer’s drug & alcohol problems;
batterer’s obsessiveness & jealousy;
batterer’s threats to kill the victim or her children;
batterer access to & familiarity with weapons;
batterer’s violence outside the home;
batterer’s suicidal ideation & behavior;
partners are separated, or victim is fleeing.
A Typical Safety Plan—
Nat’l Coalition Against Domestic Violence
• If you are still in the relationship:
• Think of a safe place to go if an argument occurs - avoid
rooms with no exits (bathroom), or rooms with weapons
• Think about and make a list of safe people to contact.
• Keep change with you at all times.
• Memorize all important numbers.
• Establish a "code word" or "sign" so that family, friends,
teachers or co-workers know when to call for help.
• Think about what you will say to your partner if heshe
• Remember, you have the right to live without fear and
…Focuses on leaving & physical
If you have left the relationship:
• Change your phone number.
• Screen calls.
• Save and document all contacts, messages, injuries or
other incidents involving the batterer.
• Change locks, if the batterer has a key.
• Avoid staying alone.
• Plan how to get away if confronted by an abusive
• If you have to meet your partner, do it in a public
• Vary your routine.
• Notify school and work contacts.
• Call a shelter for battered women.
• If you leave the relationship or are thinking of
leaving, you should take important papers and
documents with you to enable you to apply for
benefits or take legal action.
Cons for the Current State of Safety
• Too much focus on physical risk just from
perpetrator (ignores violent neighborhoods,
• Little guidance on dealing with the financial,
legal, and social risks faced by virtually all
• Generic lists—not personalized
• Doesn’t reflect the complexities that
providers see every day. Leaves advocates to
figure out how to do this on their own, one at
a time, over and over again.
A Holistic Understanding of
Risk Assessment & Risk
Multiple Criteria Decision
Types of Problems Addressed with
• Selecting routes for nuclear waste transport (Chen, Wang,
& Lin, 2008).
• Promoting recycling (Gomes et al., 2008)
• Understanding stock trading (Albadvi et al., 2007)
• Deciding best locations for emergency vehicles (Araz et
• Understanding “medical tourism”—when people will
decide to have surgery abroad (Bies & Zacharia, 2007)
• …and dozens of other applications in environmental
sciences, engineering, agriculture, and finance
What Do These Problems Have in
Common with Battering?
• Complex problems with multiple facets
• “Success” can be evaluated on multiple criteria
• Not all criteria easily evaluated with dollars or
some other uniform metric—involve value
judgements (originally developed as an
alternative to cost-benefit analysis).
• Multiple options to choose from, and these
options vary in how well they meet different
Multiple Criteria Decision Making
From Hajkowicz, 2008
• A number of models exist—here is one representative
• OK, engineers can be fond of complexity, but can
simplify this considerably
How to Apply MCDM to
(Victim Inventory of
Goals, Options, & Risks)
A. Personal Physical Risks
• 56% of attempted IP homicides are precipitated by victim
leaving or saying she would leave (Farr, 2002).
• NVAWS data also show violence persists after leaving.
• Longitudinal studies suggest some violence stops even if
victim stays (e.g., Aldarondo & Sugarman, 1996; Jasinski,
% custodial interference
Leaving is not always safer!
Custodial Interference & WPV
72% of family abductions occurred in WPV homes!
From Hamby et al., 2010
B. Physical Risks Posed to Others
• Concern for others can constrain coping:
Friends—especially those who offer shelter
Others, such as coworkers, advocates, etc.
• Ex: Across 6 studies, 48% of women in
shelters reported their pets had been
harmed, 45% said they had been
threatened, and 26% said the welfare of
their pets delayed their decision to leave
(Hamby, in preparation).
C. Financial Risks
• Financial dependence is often the most
commonly mentioned reason for staying
(e.g., Cruz, 2003).
• Many areas of potential loss:
Lower standard of living
Loss of savings
Cannot afford neighborhoods with low crime or good schools
Would have to drop out of own schooling
Loss of health insurance
Loss of car/transportation
Doesn’t have security deposit, rent, furniture for even a terrible
apartment in a terrible neighborhood.
D. Legal Risks
• Dual arrests are on the rise
(Hirschel & Buzawa, 2002)
• Arrest of batterer unlikely to lead
to jail time—will be back home
& madder than ever
• If disclose abuse to
authorities, may be reported to
CPS for “exposing” children to
• D-I-V-O-R-C-E risks
• Risks losing custody of children
• Risks unfair divorce settlement
E. Social Risks
• Stigma—Almost all of the social
statuses associated with leaving a
violent relationship are stigmatized:
– “single mother”
• Loss of friendships, extended family,
support of minister/congregants
• Children’s loss of friends, schools,
• May stigmatize entire family in
F. Other risks
• Personal & psychological risks
– Sense of failure
– Perceived loss of fealty to religious values
• Victims with disabilities and elderly victims may
lose needed assistance with self-care, health care
• Members of oppressed minority groups may not
receive equal treatment by law enforcement or
human service providers.
• In the broader world of risk management,
these types of risks are known as
“derivative losses” (Jiang & Haimes, 2004)
and are common after many types of
catastrophic events, such as terrorist attack,
war, or natural disaster.
• Can have a cascading effect, “which may
be far greater than the initial loss inflicted
by the direct disturbance” (Jiang & Haimes,
2004, p 1215).
Creating the VIGOR: Victim Inventory of
Goals, Options, & Risks
• 6 other experienced advocates reviewed the
VIGOR and provided extensive feedback, paid
• 2 pilot studies, each with approx 100 individuals
who have been victims of battering
• Students in an undergraduate research seminar
helped further streamline and simplify the
• Available for free at thevigor.org.
Sample Risk Assessment
Safety of others (ex.,
children, family, pets)
Financial risks (ex.,
insufficient income, health
insurance, need safe
Legal risks (ex., custody,
problems with law
Social risks (ex, rejection by
family, church, community)
Step 1: Identify Risks
Financially Concern for Lack Social
physical partner will insecure children* Support
harm to self murder
*Concern for children includes concern for their physical, emotional, and social well-being
Step 2: Identify Strengths
Have a job
*Personal strength refers to a sense of being capable and having the ability to persevere.
If you only remember one thing:
• “This was a great help to me just in writing
these things down, “seeing” it on paper aided
me in recognizing my accomplishments and
what I yet need to do!”
• “Helped me see different options I may have.”
• “I liked thinking about my strengths.”
• “I liked having to think and acknowledge my
strengths and options—made me hopeful.”
Step 3: Identify Women’s Options
• “Traditional” advocacy services: shelters, OPs, support
groups, physical safety planning
• Need to expand our toolkit. A better appreciation of risks
will help focus on other needs—financial planning, job
training, dealing with a stigmatized identity, talking with
family members, clergy
• Also need to re-think our time frame—many options
cannot realistically be implemented in the 30 or 60 or 90
days allowed to stay in shelter.
• In the VIGOR studies, women identified 147 different
options! (Battered Women’s Protective Strategies:
Stronger Than You Know).
Reported by single or few respondents
• Increase internet/digital security
(myspace, facebook, email)
– 1 in 5 reported
Get a dog
Apply for a gun permit
Sleep with a knife under pillow
Find new friends/confidants
Change locks (5%)
Step 4: Make Choices Based on Risk
Priorities & Options
• In MCDM, an option has “strict dominance” if it is
better than others on some criteria, and at least as
good on all others.
• The result: NOT a generic checklist of safety
precautions, BUT a personalized plan that links
coping responses to specific risks.
• Fleeing on an emergency basis with few
belongings and possibly not even with your
children, will not minimize many risks faced by
typical battered women.
Client Perceptions of the
Helpul to most
than past safety
Helpul to most
than past safety
Pros & Cons of a Strengths-Based
• Ensuring the safety and well-being of children is
the primary mission of all organizations and
professionals who serve children & families.
• A more integrated, coordinated approach offers
possibilities for programming efficiencies and
greater efficacy that are important with the
prospect of lean budget times in the foreseeable
• It is possible to build on past successes that made
violence a recognized social problem and look to
ways to accomplish even more.
• Much of this work is starting to be
done, perhaps by many of you.
• We need to make this approach more
widespread and systematic, especially for new
• Include it more formally and consistently in our
training programs and clinical supervision
Various free resources:
The VIGOR safety plan website: http://thevigor.org
Narrative and strengths-based resources at
Poly-victimization materials at the National Children’s
Advocacy Center website:
Juvenile Victimization Questionnaire:
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.